Network Test #2

Ace your homework & exams now with Quizwiz!

192 - 223

Class C

224 - 239

Class D

240 - 254

Class E

Network address Broadcast address

Compared to the number of all IPv4 addresses available per subnet, the total number of usable IPv4 addresses that can be assigned to hosts from that pool is reduced by two. Those two addresses that cannot be assigned to hosts are used as: (Choose 2)

0

Directly connected network

2.048 Mbps

E1

34.4 Mbps

E3

90

EIGRP

170

External EIGRP

56 kbps - 1.544 Mbps

Frame Relay

Packet switched

Frame Relay is an example of what WAN connection type?

Microwave ovens Cordless phones

From the following list, identify two common sources of interference with a wireless LAN (WLAN).

255.255.224.0

Given a subnet mask of /19, what is the corresponding dotted decimal notation?

/18

Given a subnet mask of 255.255.192.0, what is the corresponding prefix notation?

Unicast

Host A (with an IP address of 10.1.2.3) sends a packet to Host B (with an IP address of 192.168.1.2). What type of data flow does this represent?

2009:123:4040::A:100B

How can the following IPv6 address be condensed? 2009:0123:4040:0000:0000:000:000A:100B

30

How many assignable IP addresses exist in the 172.16.1.10/27 network?

Circuit switched

ISDN is an example of which of these WAN types?

CSU/DSU

Identify one of the following that acts as a digital modem (that is, a device that connects to a digital circuit and can distinguish between various DS0s on that digital circuit).

RED

Identify the congestion-avoidance mechanism from the following list of QoS tools.

Marking

Identify the quality of service (QoS) function that alters bits in a frame, cell, or packet.

LFI

Identify the quality of service (QoS) mechanism that can fragment large packets and interleave smaller packets in among the packet fragments.

Traffic shaping

Identify the quality of service (QoS) mechanism that can set a bandwidth limit on traffic and delays packets, rather than drops packets, attempting to exceed that bandwidth limit.

Policing

Identify the quality of service (QoS) mechanism that can set a bandwidth limit on traffic and drop packets attempting to exceed that bandwidth limit.

Dest. IP: IP address of remote host. Dest. MAC: MAC address of default gateway.

If a PC on an Ethernet network attempts to communicate with a host on a different subnet, what destination IP address and destination MAC address will be placed in the packet/frame header sent by the PC?

Open

If a WLAN does not require a user to provide credentials to associate with a wireless AP and access the WLAN, what type of authentication is said to be in use?

Approximately 5 minutes

If a network has "five nines" of availability, what is the maximum downtime per year?

10 to 15 percent

If multiple wireless access points exist in a wireless LAN (WLAN), what percentage of coverage overlap should the access points have?

5

If you need to create at least 30 subnets, how many bits must you use for subnetting?

6

If you need to create at least 58 subnets, how many bits must you use for subnetting?

3

If you need to create six subnets, how many bits should you use for subnetting?

Traffic shaping

If you want to buffer excess traffic and send it later, what traffic conditioning technology should you consider?

Class C address space

In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP addresses within that range belong to the:

110

OSPF

Bandwidth

OSPF uses cost as a metric value. What is this cost value based on?

Multicast

What IP traffic type should you use if you want to send out a video stream to 23 of the systems in the marketing department? There are 50 total systems in this department.

DNAT

What NAT variation automatically assigns an inside global address from a pool of available addresses?

Class B

What class of IP address is 172.16.1.2?

Class E

What class of address is used for experimental purposes?

DSLAM

What device terminates the DSL signal coming from a customer?

Hop count

What does RIP use for a metric?

The upload speed and the download speed differ.

What does the term asymmetric mean in DSL?

To better conceal the SSID of a WLAN

What is a common reason for disabling SSID broadcast in a wireless LAN (WLAN)?

BGP

What is a routing protocol that is used for moving prefixes back and forth between different autonomous systems?

PPP

What is a very common protocol found on dedicated leased lines?

150 ms

What is an acceptable one-way latency for video conferencing?

150 ms

What is an acceptable one-way latency in a typical VoIP network?

0.0.0.0

What is the IP address used in a default static route?

110

What is the administrative distance of OSPF in a Cisco network?

120

What is the administrative distance of RIP in a Cisco network?

0

What is the best possible value for administrative distance?

11111111.11111110.00000000.00000000

What is the binary representation of the 255.254.0.0 subnet mask?

11111111.11111111.10000000.00000000

What is the binary representation of the 255.255.128.0 subnet mask?

01110101

What is the binary representation of the decimal number 117?

Class A

What is the class of IP address 10.1.2.3/24?

2^h-2

What is the correct formula for the calculation of the number of hosts that can exist on a given subnet?

255.255.255.0

What is the default subnet mask for a Class C network?

255.248.0.0

What is the dot-decimal representation of a /13 subnet mask?

195.26.56.97

What is the first usable host IP address on the network where 195.26.56.110/27 resides?

192.168.32.10

What is the last usable host IP address on the 192.168.32.9/30 network?

128 -191

What is the leading octet value range for an IPv4 address belonging to a class B network?

8 subnets, 30 hosts per subnet

What is the maximum number of subnets and hosts per subnet for the 192.168.50.247 255.255.255.224 network?

150 ms

What is the maximum recommended one-way delay for voice traffic?

192.168.100.249 - 192.168.100.254

What is the maximum valid range for IP addresses that can be assigned to hosts on the 192.168.100.248 255.255.255.248 network?

CSU/DSU

What is the name of the device that terminates a dedicated leased line circuit?

192.168.223.12

What is the network address for the 192.168.223.15 255.255.255.252 host?

200.24.67.128

What is the network address for the 200.24.67.147/25 host?

/28

What is the prefix notation for a subnet mask of 255.255.255.240?

1-126

What is the range for a Class A address?

HFC

What kind of network is used by many cable companies to service their cable modems and contains both fiber-optic and coaxial cabling?

Cost

What metric is used by the OSPF routing protocol?

IGMP

What multicast protocol is used between clients and routers to let routers know which of their interfaces are connected to a multicast receiver?

Satellite

What option is perfect for remote locations that do not have many WAN connectivity possibilities?

Content engine

What performance optimization technology uses a network appliance, which can receive a copy of content stored elsewhere (for example, a video presentation located on a server at a corporate headquarters), and serves that content to local clients, thus reducing the bandwidth burden on an IP WAN?

ARP

What protocol is used to request a MAC address that corresponds to a known IPv4 address on the local network?

Administrative distance

What routing protocol characteristic indicates the believability of the routing protocol (as opposed to other routing protocols)?

DNS

What service is typically used to resolve a FQDN?

CSMA/CA

What technology do WLANs use to determine when they gain access to the wireless media?

VRRP

What technology is an IETF version of HSRP?

HSPA+

What technology is similar to WiMAX and offers wireless broadband service? The maximum data rate is 84 Mbps.

PPPoE

What technology is typically used in conjunction with DSL?

LACP

What technology permits the bundling of links together to increase bandwidth and redundancy?

Latency

What term defines a delay of packets in the network?

Jitter

What term defines a variation in the delay of packets in the network?

Crosstalk

What term refers to the interference caused by another link in the area?

Attenuation

What term refers to the weakening of a signal as it travels in the network?

5 GHz

What two frequencies are used for most wireless networks?

Omnidirectional

What type of antenna radiates power at relatively equal power levels in all directions?

2.4 GHz

What type of cordless phone is most likely to interfere with a wireless LAN (WLAN)?

Default static route

What type of route is manually configured in a router's routing table and tells a router where to send traffic destined for a network not in the router's routing table?

PAT

What variation of network address translation (NAT) allows multiple inside local addresses to share a single inside global address?

SNAT

What variation of network address translation (NAT) allows you to statically configure the inside global address assigned to a specific device inside your network?

ADSL

What xDSL standard is the most popular?

192.168.5.64/26

You are designing a small office/home office (SOHO) network, and you wish to have four subnets, while maximizing the number of hosts per subnet. The network you need to subnet is 192.168.5.0/24. Which of the following is one of the four subnets you should create?

/22

Your company has been assigned the 172.16.0.0/16 network for use at one of its sites. You need to use a subnet mask that will accommodate 42 subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask will you use?

/27

Your company has been assigned the 192.168.1.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 30 hosts per subnet, while maximizing the number of available subnets. What subnet mask will you use?

/27

Your company has been assigned the 192.168.30.0/24 network for use at one of its sites. You need to use a subnet mask that will accommodate seven subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask should you use?

Class A

255.0.0.0

Class B

255.255.0.0

Class C

255.255.255.0

169.254.0.0 - 169.254.255.255

A Microsoft Windows® PC is configured to obtain its IP address via DHCP. If the PC is unable to contact a DHCP server, the PC automatically assigns itself an IP address in what range?

Leased line

A T3 connection is an example of which WAN type?

IBSS

A WLAN formed directly between wireless clients (without the use of a wireless AP) is referred to as what type of WLAN?

172.16.0.0/18

A client with an IP address of 172.16.18.5/18 belongs to what network?

Packet drops Jitter Delay

A lack of bandwidth can lead to which QoS issues? (Choose three)

62

A network with 6 bits remaining for the host portion will have how many usable host addresses?

/24

A network with a subnet mask of 255.255.255.0 would have what CIDR block?

ESS

A wireless LAN (WLAN) containing at least two access points (APs) is known as what type of WLAN?

BSS

A wireless LAN (WLAN) containing only one access point (AP) is known as what type of WLAN?

155 Mbps - 622 Mbps

ATM

128

An IP version 6 (IPv6) address contains how many bits?

0 - 126

Class A

128 - 191

Class B

802.11a 802.11n

Which wireless LAN (WLAN) standards can operate in the 5 GHz frequency band? (Choose two)

35 m indoors / 120 m outdoors

802.11a

5 GHz / 54 Mbps

802.11a

5 GHz / Gbps

802.11ac

70 m indoors / 250 m outdoors

802.11ac

2.4 GHz / 11 Mbps

802.11b

32 m indoors / 140 m outdoors

802.11b

2.4 GHz / 54 Mbps

802.11g

32 m indoors / 140 m outdoors

802.11g

2.4 GHz or 5 GHz / >300 Mbps

802.11n

70 m indoors / 250 m outdoors

802.11n

255.255.255.192

A CIDR block of /26 is equivalent to what subnet mask below?

EIGRP

A Cisco router has learned a network via three different routing protocols: OSPF, EIGRP, and RIP. Which route will the router believe (that is, inject into the router's IP routing table)?

Congestion management

Queuing is another name for which of the following quality of service (QoS) functions?

120

RIP

Congestion avoidance

Random Early Detection (RED) is an example of which of the following (QoS) functions?

Convergence

Routing protocols differ in the amount of time they require to fail over from a previously active route to a backup route. What is the name for this routing protocol property?

51.84 Mbps - 159.25 Gbps

SONET

1

Statically configured network

1.544 Mbps

T1

44.736 Mbps

T3

180

The binary number 10110100 has what decimal equivalent?

255

Unknown of unbelievable

False

WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.

ADSL

What DSL variant has a distance limitation of 18,000 ft. between a DSL modem and its DSLAM?

Subnet mask

Which component of an IP address dictates how many bits of the 32-bit address are the network portion versus the host portion?

Classification

Which of the following (QoS) functions places traffic into different categories?

169.254.0.0 169.254.255.255

Which of the following address ranges is not routable within an organization?

Disabling SSID broadcast

Which of the following approaches to wireless LAN (WLAN) security helps conceal the existence of a WLAN?

802.1X

Which of the following approaches to wireless LAN (WLAN) security involves the use of an authentication server?

WPA Enterprise

Which of the following approaches to wireless LAN (WLAN) security requires users to authenticate against an authentication server's database, rather than a client being configured with a PSK?

MAC address filtering

Which of the following approaches to wireless LAN (WLAN) security restricts access to a WLAN based on a computer's wireless interface card?

WPA2

Which of the following approaches to wireless LAN (WLAN) security uses AES for encryption?

WPA

Which of the following approaches to wireless LAN (WLAN) security uses only TKIP for encryption?

Poison reverse Split horizon

Which of the following are distance-vector routing protocol features that can prevent routing loops? (Choose two)

Non-routable (private) IP address range Class B range

Which of the following are the characteristic features of the 172.16.0.0 - 172.31.255.255 address space? (Choose 2)

Class C range Non-routable (private) IP address range

Which of the following are the characteristic features of the 192.168.0.0 - 192.168.255.255 IP address space? (Choose 2)

DHCP

Which of the following features allows a network device without an IP address to dynamically be assigned IP address information (for example, IP address, subnet mask, DNS server, and WINS server) from a network server?

RIP

Which of the following is a distance-vector routing protocol with a maximum usable hop count of 15?

E50:2::4000:0:1

Which of the following is a valid representation of the IPv6 address of 0E50:0002:0000:0000:0000:4000:0000:0001?

172

Which of the following is a valid value of the first octet for a Class B IP address?

None of the answers are a valid subnet mask

Which of the following is an example of a valid subnet mask?

BGP

Which of the following is an example of an EGP?

/19

Which of the following is the CIDR notation for 255.255.224.0?

/10

Which of the following is the CIDR notation for the 255.192.0.0 subnet mask?

/27

Which of the following is the CIDR notation of the 255.255.255.224 subnet mask?

11111100

Which of the following is the binary notation of the decimal number 252?

192.168.50.159

Which of the following is the broadcast address for the 192.168.50.155/28 network?

224

Which of the following is the decimal notation of the binary number 11100000?

Demarc

Which of the following is the point in a telephone network where the maintenance responsibility passes from a telephony company to a subscriber (unless the the subscriber has purchased inside wiring maintenance)?

MIMO

Which of the following is used by IEEE 802.11n to achieve high throughput through the use of multiple antennas for transmission and reception?

Class A range Non-routable (private) IP address range

Which of the following refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 IPv4 address space? (Choose 2)

Class D 224 - 239

Which of the following refer to the leading octet value range and class of the IPv4 multicast address block? (Choose 2)

EIGRP OSPF IS-IS

Which of the following routing protocols are interior gateway protocols? (Choose three)

Warchalking

Which of the following wireless LAN (WLAN) security threats involves a user writing a symbol in a public place, letting other users know about the existence of a WLAN, and possibly information about how to access that WLAN?

War driving

Which of the following wireless LAN (WLAN) security threats involves performing reconnaissance to identify open wireless access points (APs) that could potentially become targets of future attacks?

Rogue access point

Which of the following wireless LAN (WLAN) security threats is also known as an "evil twin?"

You pay only for the bandwidth required

Which option below is an advantage of leasing a frame relay circuit over leasing a dedicated circuit?

Default gateway DNS server

Which two of the following are DHCP options that a DHCP server can assign to a DHCP client? (Choose two)

VDSL

Which type of DSL usually offers the highest bandwidth?


Related study sets

A R A L I N G P A N L I P U N A N

View Set

2022 Nissan Rogue Sport Certification

View Set

Nutrition exam chap 4,5,6 study

View Set